Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e2f9ffaf0d16ba710336920d0c753914@smtp.hushmail.com>
Date: Fri, 15 Feb 2013 15:06:05 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: netntlm bitsliced conversion

On 15 Feb, 2013, at 14:23 , magnum <john.magnum@...hmail.com> wrote:
> OTOH you could have a look at binary() in the "exploit" formats. That's where we brute-force the 2^16 possible block 3 DES keys from the NT hash. Maybe that could be done with BS? It would speed up loading a lot, but not actual cracking.

Here's that loop:

for (i = 0; i < 0x100; i++)
for (j = 0; j < 0x100; j++) {
    key[0] = i; key[1] = j;
    setup_des_key(key, &ks);
    DES_ecb_encrypt(challenge, &b3cmp, &ks, DES_ENCRYPT);
    if (!memcmp(&binary[2 + 8 * 2], &b3cmp, 8)) {
        binary[0] = i; binary[1] = j;
        goto out;
    }
}

With BS I suppose we could do this many at a time.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.